83 resultados para Internal security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract Large-Eddy Simulation (LES) and hybrid Reynolds-averaged Navier–Stokes–LES (RANS–LES) methods are applied to a turbine blade ribbed internal duct with a 180° bend containing 24 pairs of ribs. Flow and heat transfer predictions are compared with experimental data and found to be in agreement. The choice of LES model is found to be of minor importance as the flow is dominated by large geometric scale structures. This is in contrast to several linear and nonlinear RANS models, which display turbulence model sensitivity. For LES, the influence of inlet turbulence is also tested and has a minor impact due to the strong turbulence generated by the ribs. Large scale turbulent motions destroy any classical boundary layer reducing near wall grid requirements. The wake-type flow structure makes this and similar flows nearly Reynolds number independent, allowing a range of flows to be studied at similar cost. Hence LES is a relatively cheap method for obtaining accurate heat transfer predictions in these types of flows.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The coalescence and mixing of a sessile and an impacting liquid droplet on a solid surface are studied experimentally and numerically in terms of lateral separation and droplet speed. Two droplet generators are used to produce differently colored droplets. Two high-speed imaging systems are used to investigate the impact and coalescence of the droplets in color from a side view with a simultaneous gray-scale view from below. Millimeter-sized droplets were used with dynamical conditions, based on the Reynolds and Weber numbers, relevant to microfluidics and commercial inkjet printing. Experimental measurements of advancing and receding static contact angles are used to calibrate a contact angle hysteresis model within a lattice Boltzmann framework, which is shown to capture the observed dynamics qualitatively and the final droplet configuration quantitatively. Our results show that no detectable mixing occurs during impact and coalescence of similar-sized droplets, but when the sessile droplet is sufficiently larger than the impacting droplet vortex ring generation can be observed. Finally we show how a gradient of wettability on the substrate can potentially enhance mixing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked quantum key distribution system. Despite the enhanced security level, the obtained secure key rates are the highest reported so far at all fibre distances.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report the operation of a gigahertz clocked quantum key distribution system featuring high composable and quantifiable security while maintaining more than 1 Mbit/s secure key rate over a 50 km quantum channel. © OSA 2013.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses various techniques that may be used to combat counterfeiting in the pharmaceutical supply chain. These include the use of electronic pedigrees (to ensure the integrity of the supply chain), together with mass-serialization (to provide for a unique lifecycle history of each individual package) and authentication of the product (to check for any discrepancies in the various attributes of the product and its packaging are as intended for that individual package). Management of the pedigree process and product authentication is discussed in some detail, together with various other learnings from the Drug Security Network, including identification of some remaining vulnerabilities and suggestions for tightening these loopholes. © 2008 Springer-Verlag Berlin Heidelberg.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Counterfeit trade developed into a severe problem for many industries. While established security features such as holograms, micro printings or chemical markers do not seem to efficiently avert trade in illicit imitation products, RFID technology, with its potential to automate product authentications, may become a powerful tool to enhance brand and product protection. The following contribution contains an overview on the implication of product counterfeiting on affected companies, provides a starting point for a structured requirements definition for RFID-based anti-counterfeiting systems, and outlines several principal solution approaches that are discussed in greater detail in the subsequent chapters. © 2008 Springer-Verlag Berlin Heidelberg.